top of page

 INFORMAITON SECURITY SERVICES

AdobeStock_405228096.jpeg

Static Solutions Security Consulting provides a number of services to address your organization's information security needs.  We take a holistic approach with our clients to ensure your current security posture with regards to protecting critical information is at a level commensurate with the latest threats and available resources.  State and federal compliance requirements are also reviewed.  If any portion of your security posture is below par, we will be there to assist with the following:

AdobeStock_459683548.jpeg
AdobeStock_459683548.jpeg
AdobeStock_405228096.jpeg

Information Security Consultation

A member of our consulting team will speak with key personnel to identify your organization's concerns with your current information security posture.  we will discuss your current risks based on trends related to your industry along with all applicable federal regulations.  From this interaction, we will get an idea of  where your security posture stands.   We will then discuss a road map to reduce risk to your organization.

AdobeStock_459683548.jpeg
AdobeStock_405228096.jpeg

Comprehensive Information Security Assessment

If you are not fully aware of your organizations security posture, you will not know how to efficiently allocate resources.  With our comprehensive assessment, we will look at your organization by the three infosec facets:

Personnel Security: Reviewing your employee's current infosec IQ and situational awareness when it comes to protecting critical information.

Physical Security: We will evaluate your physical security posture related physical access protocols, processes and procedures and the state of your supporting equipment such as locks, windows and cameras.

Cybersecurity: We will review your organization's digital footprint to include your website, IT hardware and software, infrastructure, and related processes and procedures.  We will also review any 3rd party support agreements related to your data and its protection.  There may be additional items assessed based on industry and organization size. 

Upon completion, you will receive a comprehensive report of your current posture, critical threats, recommendation for improvement and a high-level executive brief.

**An Information Security Consultation is required prior to an assessment**

AdobeStock_459683548.jpeg
AdobeStock_284864831.jpeg
AdobeStock_405228096.jpeg

Tailored Security Training

The first line of defense is your employees.  They are also the most targeted part of your company.  We address this with a short interview with your employees to gauge their knowledge and awareness of your organization’s infosec processes along with common security best practices.  The training will be focused on specific roles in the organization and how information security ties into their daily duties.  This approach will improve security awareness from the front desk to senior executive leadership.  If your organization already uses a online training suite, this will greatly complement complete reinforcement of your overall security concepts.

AdobeStock_459683548.jpeg
AdobeStock_405228096.jpeg

State/Federal Assessment/Audit Prep

State and Federal compliance is key to prevent undue fines and the possibility of getting shut down. This will also ensure that your organization meets minimum security standards. Our assessment will review your organization strictly on the current regulations and policies that are required by law.  We will enter the assessment  with no bias as to make this as close to the official audit as possible.  We will provide reports identifying any deficiencies in your posture and also give recommendations to address them.

AdobeStock_459683548.jpeg
AdobeStock_482673477_edited.jpg
AdobeStock_405228096.jpeg

3rd party Service Provider (TPSP) Review and Integration

TPSPs are one of the most exploited vulnerabilities for an organization.  Most companies will sign on a 3rd party to support services such as data storage solutions, on-site IT services and incident management.  Even though you may hire these companies, you still have the ultimate responsibility of securing your customer's and internal data in the event of a data breach.  These TPSPs must be thoroughly vetted and reviewed for any signs of risk.  At Static Solutions Security, being a TPSP ourselves, we understand the responsibilities we have to our clients and take that very seriously.  That's why we review your current contracts and ensure they are tied in with your current cybersecurity strategy.  We would rather work with your service providers if they have provided outstanding service to you and you are satisfied.  If they do raise any red flags, we will notify you immediately and give recommendations on either get them on track to appropriately support your needs or getting another TPSP to replace them.

AdobeStock_459683548.jpeg
spartan shield.jpg
AdobeStock_405228096.jpeg

Spartan Shield Program

This service is a 6 month, fully integrated information security improvement campaign.  Our goal is to assist you in a done-with-you style of integration to bring small to medium sized companies to a exceptional security posture.  This program will be customized to ensure balance between efficiency and effectiveness.  Spartan Shield will also will give your organization a system to implement more effective information security self inspections and better educate senior leaders on future decisions with regards to any information systems' 3rd party support.

AdobeStock_459683548.jpeg
AdobeStock_341252989.jpeg
AdobeStock_405228096.jpeg

Iron Wall Program

This service is a 12 month, fully integrated information security improvement and cultural campaign.  Our goal is to assist you in a done-with-you style of integration to bring larger companies to an exceptional security posture.  This program will be customized to ensure balance between efficiency and effectiveness.  Iron Wall will also give your organization a system to implement more effective information security self-inspections and better educate senior leaders on future decisions with regards to any information systems' 3rd party support.

bottom of page